-
1
-
-
0030384775
-
Techniques for data hiding
-
Bender W., Gruhl D., Morimoto N., and Lu A. Techniques for data hiding. IBM Syst. J. 35 3-4 (1996) 313-336
-
(1996)
IBM Syst. J.
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
2
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox I.J., Kilian J., Leighton F.T., and Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6 12 (1997) 1673-1687
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
3
-
-
0032625842
-
Watermarking as communication with side information
-
Cox I.J., Miller M.L., and Mckellips A.L. Watermarking as communication with side information. Proc. IEEE 87 7 (1999) 1127-1141
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1127-1141
-
-
Cox, I.J.1
Miller, M.L.2
Mckellips, A.L.3
-
4
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
Wong P.W., and Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10 10 (2001) 1593-1601
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
5
-
-
33646415682
-
Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol
-
Chen T.H., and Tsai D.S. Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol. Pattern Recognition 39 8 (2006) 1530-1541
-
(2006)
Pattern Recognition
, vol.39
, Issue.8
, pp. 1530-1541
-
-
Chen, T.H.1
Tsai, D.S.2
-
6
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
Lin C.Y., and Chang S.F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circ. Syst. Video Technol. 11 2 (2001) 153-168
-
(2001)
IEEE Trans. Circ. Syst. Video Technol.
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
7
-
-
0032785523
-
Hidden digital watermarks in images
-
Hsu C.T., and Wu J.L. Hidden digital watermarks in images. IEEE Trans. Image Process. 8 1 (1999) 58-68
-
(1999)
IEEE Trans. Image Process.
, vol.8
, Issue.1
, pp. 58-68
-
-
Hsu, C.T.1
Wu, J.L.2
-
8
-
-
0037644874
-
Watermark detection based on the properties of error control codes
-
Loo P., and Kingsbury N. Watermark detection based on the properties of error control codes. IEE Proc. Vis. Image Signal Process. 150 2 (2003) 115-121
-
(2003)
IEE Proc. Vis. Image Signal Process.
, vol.150
, Issue.2
, pp. 115-121
-
-
Loo, P.1
Kingsbury, N.2
-
9
-
-
47049094180
-
A simple ICA-based watermarking scheme
-
Nguyen T.V., and Patra J.C. A simple ICA-based watermarking scheme. Digit. Signal Process. 18 (2008) 762-776
-
(2008)
Digit. Signal Process.
, vol.18
, pp. 762-776
-
-
Nguyen, T.V.1
Patra, J.C.2
-
10
-
-
0036502697
-
An SVD-based watermarking scheme for protecting rightful ownership
-
Liu R., and Tan T. An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 4 1 (2002) 121-128
-
(2002)
IEEE Trans. Multimed.
, vol.4
, Issue.1
, pp. 121-128
-
-
Liu, R.1
Tan, T.2
-
11
-
-
33645221486
-
A semi-blind digital watermarking scheme based on singular value decomposition
-
Shieh J.M., Lou D.C., and Chang M.C. A semi-blind digital watermarking scheme based on singular value decomposition. Comput. Stand. Interf. 28 4 (2006) 428-440
-
(2006)
Comput. Stand. Interf.
, vol.28
, Issue.4
, pp. 428-440
-
-
Shieh, J.M.1
Lou, D.C.2
Chang, M.C.3
-
12
-
-
33646809377
-
An SVD-based watermarking method for image content authentication with improved security
-
IEEE
-
Lee S., Jang D., and Yoo C.D. An SVD-based watermarking method for image content authentication with improved security. Proc. IEEE Int. Conference on Acoustics, Speech, and Signal Processing vol. 2 (March 2005), IEEE 525-528
-
(2005)
Proc. IEEE Int. Conference on Acoustics, Speech, and Signal Processing
, vol.2
, pp. 525-528
-
-
Lee, S.1
Jang, D.2
Yoo, C.D.3
-
13
-
-
34247585102
-
On SVD-based watermarking algorithm
-
Chung K.L., Yang W.N., Huang Y.H., Wu S.T., and Hsu Y.C. On SVD-based watermarking algorithm. Appl. Math. Comput. 188 1 (2007) 54-57
-
(2007)
Appl. Math. Comput.
, vol.188
, Issue.1
, pp. 54-57
-
-
Chung, K.L.1
Yang, W.N.2
Huang, Y.H.3
Wu, S.T.4
Hsu, Y.C.5
-
15
-
-
50249158477
-
An improved SVD-based watermarking technique for image and document authentication
-
Patra J.C., Soh W., Ang E.L., and Meher P.K. An improved SVD-based watermarking technique for image and document authentication. Proc. IEEE Asia Pacific Conference on Circuits and Systems, Singapore (December 2006) 1984-1987
-
(2006)
Proc. IEEE Asia Pacific Conference on Circuits and Systems, Singapore
, pp. 1984-1987
-
-
Patra, J.C.1
Soh, W.2
Ang, E.L.3
Meher, P.K.4
-
16
-
-
0036396975
-
Hierarchical access control based on Chinese remainder theorem
-
Chen T.-S., and Chung Y.-F. Hierarchical access control based on Chinese remainder theorem. Comput. Secur. 2 6 (2002) 565-570
-
(2002)
Comput. Secur.
, vol.2
, Issue.6
, pp. 565-570
-
-
Chen, T.-S.1
Chung, Y.-F.2
-
17
-
-
45549098627
-
Sharing secrets in stego images with authentication
-
Chang C.-C., Hsieh Y.-P., and Lin C.-H. Sharing secrets in stego images with authentication. Pattern Recognition 41 (2008) 3130-3137
-
(2008)
Pattern Recognition
, vol.41
, pp. 3130-3137
-
-
Chang, C.-C.1
Hsieh, Y.-P.2
Lin, C.-H.3
-
18
-
-
27844564305
-
A combining method of quasi-cyclic LDPC codes by Chinese remainder theorem
-
Myung S., and Yang K. A combining method of quasi-cyclic LDPC codes by Chinese remainder theorem. IEEE Comm. Lett. 9 9 (2005) 823-825
-
(2005)
IEEE Comm. Lett.
, vol.9
, Issue.9
, pp. 823-825
-
-
Myung, S.1
Yang, K.2
-
19
-
-
0346146968
-
RNS sign detector based on Chinese remainder theorem II (CRT II)
-
Al-Radadi E., and Siy P. RNS sign detector based on Chinese remainder theorem II (CRT II). Comput. Math. Appl. 46 (2003) 1559-1570
-
(2003)
Comput. Math. Appl.
, vol.46
, pp. 1559-1570
-
-
Al-Radadi, E.1
Siy, P.2
-
20
-
-
56149118070
-
Robust t-out-of-n oblivious transfer mechanism based on CRT
-
Chang C.-C., and Lee J.-S. Robust t-out-of-n oblivious transfer mechanism based on CRT. J. Netw. Comput. Appl. 32 1 (2009) 226-235
-
(2009)
J. Netw. Comput. Appl.
, vol.32
, Issue.1
, pp. 226-235
-
-
Chang, C.-C.1
Lee, J.-S.2
-
21
-
-
69949143570
-
Robust CRT-based watermarking technique for authentication of image and document
-
Patra J.C., Karthik A., Meher P.K., and Bornand C. Robust CRT-based watermarking technique for authentication of image and document. Proc. IEEE Int. Conf. Systems, Man, and Cybernetics (SMC 2008), Singapore (October 2008) 3250-3255
-
(2008)
Proc. IEEE Int. Conf. Systems, Man, and Cybernetics (SMC 2008), Singapore
, pp. 3250-3255
-
-
Patra, J.C.1
Karthik, A.2
Meher, P.K.3
Bornand, C.4
|